Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
A key challenge facing wireless networking is to utilize the spectrum as e ciently as possible given current channel conditions and in the most e ective way for each application. ...
This article is addressing a recurrent problem in biology: mining newly built large scale networks. Our approach consists in comparing these new networks to well known ones. The v...
The Noise Sensitivity Signature (NSS), originally introduced by Grossman and Lapedes (1993), was proposed as an alternative to cross validation for selecting network complexity. I...
In this paper, the hexagonal approach was proposed for modeling the functioning of cerebral cortex, especially, the processes of learning and recognition of visual information. Thi...